[wpdreams_ajaxsearchpro_results id=1 element='div']

What’s Wired Equivalent Privacy?

[ad_1]

Wired equivalent privacy (WEP) is a wireless security protocol that uses encryption keys to protect data sent to and from a wireless network. However, it is vulnerable to hacker attacks and has been replaced by more secure protocols like Wi-Fi Protected Access (WPA). WEP generates a key that must be owned by any computer system that connects to the network, but its major flaw is that repeating patterns become unavoidable, making it easy for hackers to decrypt the key. Newer wireless systems use WPA and similar methods for better security.

Wired equivalent privacy (WEP) is a form of wireless security protection that was initially implemented in early wireless standards, particularly those using the 802.11 standards. This form of security basically uses an encryption key to protect data sent to and from the wireless network, preventing unauthorized users from accessing the network. The method used in WEP encryption, however, is not ideal and has proven to be too open to hacker attacks, allowing them to spoof authentication. The wired equivalent privacy has largely been replaced by Wi-Fi Protected Access (WPA) protocols which are more secure and can better secure a wireless network.

The main purpose of wired equivalent privacy protocols is to protect users of a wireless network from interference or attacks by unauthorized users. Wireless networks are, by nature, more open to attack than wired networks, as wired networks are easily controlled by physically limiting the number of systems connected to them. With the proliferation of wireless technology through the 802.11 standards, new protocols had to be developed to easily and efficiently secure wireless systems. The primary method of security in early 802.11 wireless devices was the implementation of wired equivalent privacy.

WEP basically works by generating a key that must be owned by any computer system that connects to the network. This key is protected by encryption, but is also used by any data that leaves the wireless system. Individual packets of data sent from a router or other system connected to a wireless network protected by wired equivalent privacy include an encrypted form of the key that secures that network. This encrypted version of the key essentially consists of the key itself and other data generated and transmitted to keep the key secure.

The major flaw in this type of privacy, however, is that this secondary data is too small in size and thus repeating patterns become unavoidable for any system. A hacker can intercept packets being sent by the system and even cause additional packets to be sent to look for these repeating patterns. Once found, it becomes easy enough for a program to quickly and accurately decrypt the key and obtain the authentication code needed to access the wireless system. Newer wireless systems, including later versions of the 802.11 standards, use WPA and similar methods to secure these networks, which allow for more diverse keys that can’t be cracked as easily as the wired equivalent privacy.

[ad_2]